{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T15:35:55Z","timestamp":1756308955528},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_18","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"222-235","source":"Crossref","is-referenced-by-count":35,"title":["Escrow Encryption Systems Visited: Attacks, Analysis and Designs"],"prefix":"10.1007","author":[{"given":"Yair","family":"Frankel","sequence":"first","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"R. Anderson, Why Cryptography Fails, In the Proceedings of The 1st ACM Conference on Computer and Communications Security, Nov. 1993, 215\u2013227.","DOI":"10.1145\/168588.168615"},{"key":"18_CR2","unstructured":"D. M. Balenson, C. M. Ellison, S. B. Lipner and S. T. Walker A New Approach to Software Key Escrow Encryption, Trusted Information Systems, Inc., (also in [21])."},{"issue":"4","key":"18_CR3","first-page":"204","volume":"13","author":"T. Beth","year":"1990","unstructured":"T. Beth, Zur Diskussion Gestellt, Informatik-Spektrum 13(4), pp. 204\u2013215, 1990. (An initial suggestion for Key Escrow System and Agent-a public presentation to the German Government, In German).","journal-title":"Informatik-Spektrum"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"T. Beth, H.-J. Knobloch, M. Otten, G.J. Simmons and P. Wichmann, Towards Acceptable Key Escrow Systems, In the Proceedings of The 2nd ACM Conference on Computer and Communications Security, November 1994 51\u201358.","DOI":"10.1145\/191177.191191"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"M. Blaze, Protocol failure in the Escrowed Encryption Standard, In the Proceedings of The 2nd ACM Conference on Computer and Communications Security, November 1994, 59\u201367. (also in [21]).","DOI":"10.1145\/191177.191193"},{"key":"18_CR6","unstructured":"E. F. Brickel, et al. Interim Review: The SKIPJACK Algorithm, July 93. (Also in [21])."},{"key":"18_CR7","unstructured":"D. E. Denning et al., To Tap or Not To Tap, CACM 93."},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"D. E. Denning and M. Smid, Key Escrowing Now, IEEE Communications Magazine, Sep. 1994, pp. 54\u201368.","DOI":"10.1109\/35.312844"},{"key":"18_CR9","unstructured":"Department of Justice, Letter dated Feb. 4, 1994"},{"key":"18_CR10","unstructured":"A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, How to Share a Function Securely, ACM STOC 94. (Initial version May 92: FOCS 92 submission)."},{"key":"18_CR11","unstructured":"Y. Desmedt, Securing Traceability of Ciphertexts: Towards a Secure Software Key Escrow Systems, Eurocrypt 95."},{"key":"18_CR12","unstructured":"Y. Desmedt, Y. Frankel, and M. Yung, A scientific statement on the Clipper Chip technology and alternatives, (a letter to NIST as an answer to a request for comments on key escrow technology)."},{"key":"18_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology, Proc. of Crypto\u2019 89","author":"Y. Desmedt","year":"1990","unstructured":"Y. Desmedt and Y. Frankel, Threshold cryptosystems, In G. Brassard, editor, Advances in Cryptology, Proc. of Crypto\u2019 89 (Lecture Notes in Computer Science 435), pages 307\u2013315. Springer-Verlag, 1990."},{"key":"18_CR14","series-title":"Lect Notes Comput Sci","first-page":"111","volume-title":"Advances in Cryptology-Proc. Crypto\u2019 86","author":"Y. Desmedt","year":"1987","unstructured":"Y. Desmedt and J.-J. Quisquater, Public-key systems based on the difficulty of tampering (Is there a difference between DES and RSA?), Advances in Cryptology-Proc. Crypto\u2019 86, Springer-Verlag LNCS 263, 1987, 111\u2013117."},{"issue":"6","key":"18_CR15","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Trans. on Information Theory 22(6), 1976, pp. 644\u2013654.","journal-title":"IEEE Trans. on Information Theory"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/TIT.1985.1057073","volume":"31","author":"T. Gamal El","year":"1985","unstructured":"T. El Gamal, A Public key cryptosystem and a signature scheme based on discrete logarithm, IEEE Trans. on Information Theory 31, 465\u2013472, 1985.","journal-title":"IEEE Trans. on Information Theory"},{"key":"18_CR17","unstructured":"The FBI, Law Enforcement REQUIREMENTS for the Surveillance of Electronic Communications, June 1994. (Prepared by the Federal Bureau of Investigations (FBI) in cooperation with federal, state, and local law enforcement members of the National Technical Investigation Association)."},{"key":"18_CR18","unstructured":"FIPS PUB 185, Escrowed Encryption Standard February 1994. (Dept. of Commerce)."},{"key":"18_CR19","unstructured":"Y. Frankel and M. Yung, Designs of escrow encryption systems: models, methodologies and technologies, (Available from the authors)."},{"key":"18_CR20","unstructured":"Y. Frankel and M. Yung, Preliminary version of current paper, originally submitted to IEEE Security and Privacy 95 (Oakland), Nov. 94."},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Building in Big Brothers: the cryptographic policy debate, ed. L.J. Hoffman, Springer Verlag, 1995.","DOI":"10.1007\/978-1-4612-2524-9"},{"key":"18_CR22","unstructured":"J. Kilian and F.T. Leighton, Failsafe Key Escrow Systems, Crypto 95."},{"key":"18_CR23","unstructured":"D. Kravitz, Deficiencies of Software-based key escrow. a letter."},{"issue":"2","key":"18_CR24","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/BF00196792","volume":"3","author":"S.M. Matyas","year":"1991","unstructured":"S.M. Matyas, Key Processing with Control Vectors, Journal of Cryptology, 3(2), pp 113\u2013136, 1991","journal-title":"Journal of Cryptology"},{"key":"18_CR25","unstructured":"S. Micali, Fair public-key cryptosystems, Crypto\u2019 92 (also in [21])."},{"key":"18_CR26","unstructured":"The Mosaic program office, Mosaic: Cryptographic intertrace programmers guide for the Tessera crypto card, Draft Revision P1.4."},{"key":"18_CR27","unstructured":"MYK-78T Encryption\/Decryption VLSI, Mykotronx Inc."},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung, Public-key cryptosystem provably secure against chosen ciphertext attack, Proc. of the 22nd Annual Symposium on the Theory of Computing, 1990, pp. 427\u2013437.","DOI":"10.1145\/100216.100273"},{"key":"18_CR29","unstructured":"T. P. Pedersen, Distributed Provers with Applications to Undeniable Signature, Eurocrypt\u2019 91. 1991."},{"key":"18_CR30","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems, Comm. of ACM, 21 (1978), pp 120\u2013126.","journal-title":"Comm. of ACM"},{"key":"18_CR31","unstructured":"G. Simmons, The Subliminal Channel and Digital Signature, Eurocrypt 84, 51\u201367."},{"key":"18_CR32","unstructured":"The White House Press Release Regarding the Clipper, the White House \u2014 office of the press secretary, April 16, 93."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T04:19:00Z","timestamp":1556770740000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}